Rapid7 Blog

Logentries

Logging user activity is a great way to understand what users are doing, and how they are using network and computing resources. Collecting data from the standpoint of a user identity or login is a great way to correlate all kinds of information, too, including…

In the old days when transactional behavior happened in a single domain, in step-by-step procedures, keeping track of request/response behavior was a simple undertaking. However, today one request to a particular domain can involve a myriad of subsequent asynchronous requests from the starting domain…

I want to share something with you that is pretty amazing. But, before I do, allow me to provide the backstory. The Backstory I’ve been using Open Source Software (OSS) for a while now. I started with the big ones, Apache, Maven, MySQL, etc……

If you look at any OO-based codebase of a nontrivial size, you’ll [hopefully] find well understood behavior formalized and encapsulated through the effective use of polymorphism- either via interfaces which decouple calling code from a types’ implementation, or via sub typing to share code…

Our mission at Rapid7 is to solve complex security and IT challenges with simple, innovative solutions. Late last year Logentries joined the Rapid7 family to help to drive this mission. The Logentries technology itself had been designed to reveal the power of log data to…

Logging from the client side of a web application can seem like a challenge. The web browser exposes everything to the user. There is no way to hide anything delivered to the client from prying eyes, including your log token to your Logentries log. There…

The VHS tape was a thing of a magic that is alien in the world of on-demand media. It represented a promise of entertainment. A promise only realized when loading the tape into the player and pressing the play button. There was an air of…

The October Walkthrough Webinar was broadcasted & recorded on October 27th 2016. This broadcast included a Logentries demonstration and live Q&A. Below is a sample of some of the questions asked by the audience following the demonstration. To try out the features mentioned…

In previous posts of this series, we have gone through how leexportpy works, how it is configured and currently supported services for transforming and pushing Logentries Query API data to other systems. When it comes to creating a new service for leexportpy, the core of…

Here at Logentries we are constantly adding to the options for analysing log generated data. The query language ‘LEQL’ has a number of statistical functions and a recent addition has been the new Standard Deviation calculation. LEQL query example where(image=debian) groupby(location) calculate(…

A previous blog showed how MQTT logs can be sent to Logentries for storage, analysis and how those logs can be to alert on potential MQTT security threats, as well as to store and visualize sensor data. This blog follows that by showing how to…

The Internet is evolving and part of this is the emerging Internet of Things (IoT). IoT allows us to use the Internet to seamlessly connect the cyberspace and real world using physical sensors at huge scale, allowing us to gather and analyze the data across…

All the way back in 2007, security industry analyst and expert Dr. Larry Ponemon of the eponymous institute wrote for Network World that “data breaches are a pervasive problem for most organizations in the United States today.” Nobody is prepared to argue that this situation…

Key trends. Expert advice. The latest techniques and technology. UNITED 2016 is created from the ground up to provide the insight you need to drive your security program forward, faster. This year, we're also hoping you can provide us with the insight we need to…